期刊文献+

基于Honeypot主动防御系统的数据控制设计 被引量:1

Design of Honeypot Data Control Based on Active Defense
下载PDF
导出
摘要 主动防御技术是近年来网络安全领域发展中的一种新技术。文章以Honeypot为基础,建立系统模型,重点对数据控制进行了优化设计。数据控制是本系统中最关键的一环,优化设计采用数据重定向功能和数据包抑制设计,既能灵活诱骗攻击者的攻击行为,又能对其攻击活动进行一定的限制,大大降低Honeypot带来的安全风险。 Active defense technology is a new technology developed in recent years in thefield of network security. This paper is based on Honeypot, establishes the system model, the key to optimize the design of the data control. Data control is one of the most important in this system, data redirection and packet suppression design withdesign optimization, which can flexibly deception attack behavior, but also the attackactivities of certain restrictions, greatly reduce the security risk brought by Honeypot.
出处 《电脑与信息技术》 2014年第4期25-28,共4页 Computer and Information Technology
基金 湖南省教育厅科研基金项目(项目编号:12C0504)
关键词 HONEYPOT 数据控制 数据过滤 重定向 honeypot data-control Data filtering redirected
  • 相关文献

参考文献13

二级参考文献75

  • 1赵伟锋,曾启铭.一种了解黑客的有效手段——蜜罐(Honeypot)[J].计算机应用,2003,23(z1):259-261. 被引量:27
  • 2李洁,高新波,焦李成.基于特征加权的模糊聚类新算法[J].电子学报,2006,34(1):89-92. 被引量:114
  • 3张永铮,方滨兴,迟悦,云晓春.用于评估网络信息系统的风险传播模型[J].软件学报,2007,18(1):137-145. 被引量:76
  • 4田俊峰,刘永立.一种新的蜜网模型——BRHNS[J].计算机工程与应用,2007,43(7):139-143. 被引量:3
  • 5Afrand Agah, Das Sajal K. Preventing DoS attacks in wireless sensor networks: A repeated game theory approach [J]. International Journal of Network Security, 2007, 5(2): 145-153.
  • 6Hadi O, Mona M, Chadi A, et al. Game theoretic models for detecting network intrusions [J]. Computer Communications, 2008, 31(10): 1934-1944.
  • 7Liu Yu, Cristian C, Hong Man. A Bayesian game approach for intrusion detection in wireless ad hoc networks [C/OL] // ProcofValuetools's06. 2006= 11-13 E2010 03 08]. http:// citeseerx, ist. psu. edu/viewdoc/summary?doi= 10. 1.1.86. 8169.
  • 8Theodorakopoulos G, Baras J S. Game theoretic modeling of malicious users in collaborative networks [J]. IEEE Journal on Selected Areas in Communications, 2008, 26(7): 1317- 1327.
  • 9Kotenko I. Multi-agent modelling and simulation of cyber attacks and cyber-defense for homeland security [J].Information & Automation, 2007, 11(8): 614-619.
  • 10Chen Y, Boehm B, Sheppard L. Value driven security threat modeling based on attack path analysis [C] ]/Proc of the 40th Annual Hawaii Int Conf on System Sciences. Los Alamitos, CA:IEEE Computer Society, 2007.

共引文献1174

同被引文献12

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部